Re: PFinger 0.7.8 format string vulnerability (#NISR16122002B)

From: der Mouse (mouseat_private)
Date: Mon Dec 16 2002 - 13:49:21 PST

  • Next message: Muhammad Faisal Rauf Danka: "Fwd: CERT Advisory CA-2002-36 Multiple Vulnerabilities in SSH Implementations"

    >> Due to the way requests are logged the only way to exploit this
    >> vulnerability is through setting the DNS name of the fingering host
    >> to the attacker supplied format string.
    
    > I really wonder how you want to exploit this... Last time I checked
    > all tested resolvers (Linux/BSD/Solaris) did not allow % within
    > domain names and so your format string vulnerability is not
    > exploitable at all...
    
    If your resolver does not allow "funny characters" in domains, it is
    broken.  If nothing else, that sort of crippling makes it approximately
    impossible to investigate abuse that involves using such domain names.
    (At least one spammer outfit is known to use domain names containing
    control characters and I think at least one other unusual character,
    prseumably in an attempt to make it harder to investigate their spam.)
    
    0x00 octets in domain labels won't work well with APIs that use C
    strings, but the resolver shouldn't misbehave when encountering them
    internally - and breaking on any of the other 255 octets is a Very Bad
    Idea.  (At least in the resolver.  Other software and protocols may of
    course impose their own restrictions, of varying degrees of sanity.
    But the resolver infrastructure has to support all uses of the DNS,
    including "unusual" uses.)
    
    /~\ The ASCII				der Mouse
    \ / Ribbon Campaign
     X  Against HTML	       mouseat_private
    / \ Email!	     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B
    



    This archive was generated by hypermail 2b30 : Wed Dec 18 2002 - 12:21:06 PST